Cyber threat intelligence. (2023)
- Record Type:
- Book
- Title:
- Cyber threat intelligence. (2023)
- Main Title:
- Cyber threat intelligence
- Further Information:
- Note: Martin Lee.
- Authors:
- (Computer security expert), Lee, Martin
- Contents:
- Preface About the Author Abbreviations 1. Introduction Definitions History of Threat Intelligence Utility of Threat Intelligence Summary 2. Threat Environment Threat Risk and Vulnerability Threat Actors TTPs - Tactics, Techniques and Procedures Victimology Threat Landscape Attack Vectors, Vulnerabilities and Exploits Untargeted vs Targeted Attacks Persistence Thinking Like a Threat Actor Summary 3. Applying Intelligence Planning Intelligence Gathering The Intelligence Cycle Situational Awarenesss Goal Oriented Security and Threat Modelling Strategic, Operational and Tactical Intelligence Incident Preparedness and Response Summary 4. Collecting Intelligence Hierarchy of Evidence Understanding Intelligence Third Party Intelligence Reports Internal Incident Reports Active Intelligence Gathering Summary 5. Generating Intelligence The Intelligence Cycle in Practice Applying the Intelligence Cycle Sources of Data Searching Data Threat Hunting Transforming Data into Intelligence Sharing Intelligence Measuring the Effectiveness of Generated Intelligence Summary 6. Attribution Holding Perpetrators to Account Standards of Proof Mechanisms of Attribution Anti-Attribution Techniques Third Party Attribution Using Attribution Summary 7. Professionalism Notions of Professionalism Developing a New Profession Behaving Ethically Legal and Ethical Environment Managing the Unexpected Continuous Improvement Summary 8. Future Threats and Conclusions Emerging Technologies Emerging Attacks EmergingPreface About the Author Abbreviations 1. Introduction Definitions History of Threat Intelligence Utility of Threat Intelligence Summary 2. Threat Environment Threat Risk and Vulnerability Threat Actors TTPs - Tactics, Techniques and Procedures Victimology Threat Landscape Attack Vectors, Vulnerabilities and Exploits Untargeted vs Targeted Attacks Persistence Thinking Like a Threat Actor Summary 3. Applying Intelligence Planning Intelligence Gathering The Intelligence Cycle Situational Awarenesss Goal Oriented Security and Threat Modelling Strategic, Operational and Tactical Intelligence Incident Preparedness and Response Summary 4. Collecting Intelligence Hierarchy of Evidence Understanding Intelligence Third Party Intelligence Reports Internal Incident Reports Active Intelligence Gathering Summary 5. Generating Intelligence The Intelligence Cycle in Practice Applying the Intelligence Cycle Sources of Data Searching Data Threat Hunting Transforming Data into Intelligence Sharing Intelligence Measuring the Effectiveness of Generated Intelligence Summary 6. Attribution Holding Perpetrators to Account Standards of Proof Mechanisms of Attribution Anti-Attribution Techniques Third Party Attribution Using Attribution Summary 7. Professionalism Notions of Professionalism Developing a New Profession Behaving Ethically Legal and Ethical Environment Managing the Unexpected Continuous Improvement Summary 8. Future Threats and Conclusions Emerging Technologies Emerging Attacks Emerging Workforce Conclusion 9. Case Studies Target Compromise 2013 WannaCry 2017 NotPetya 2017 VPNFilter 2018 SUNBURST and SUNSPOT 2020 Macron Leaks 2017 Index … (more)
- Edition:
- 1st
- Publisher Details:
- Hoboken : John Wiley & Sons, Inc
- Publication Date:
- 2023
- Extent:
- 1 online resource (304 pages)
- Subjects:
- 005.87
Cyber intelligence (Computer security)
Cyberterrorism -- Prevention
Cyberspace operations (Military science) - Languages:
- English
- ISBNs:
- 9781119861768
- Related ISBNs:
- 9781119861744
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.769645
- Ingest File:
- 19_012.xml